Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings

Author:   Frederic Cuppens ,  Yves Deswarte ,  Dieter Gollmann ,  Michael Waidner
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2000 ed.
Volume:   1895
ISBN:  

9783540410317


Pages:   330
Publication Date:   20 September 2000
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $184.67 Quantity:  
Add to Cart

Share |

Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings


Add your own review!

Overview

his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000. The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents.

Full Product Details

Author:   Frederic Cuppens ,  Yves Deswarte ,  Dieter Gollmann ,  Michael Waidner
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2000 ed.
Volume:   1895
Dimensions:   Width: 15.50cm , Height: 1.80cm , Length: 23.50cm
Weight:   1.060kg
ISBN:  

9783540410317


ISBN 10:   3540410317
Pages:   330
Publication Date:   20 September 2000
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Personal Devices and Smart Cards.- Checking Secure Interactions of Smart Card Applets.- Verification of a Formal Security Model for Multiapplicative Smart Cards.- How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications.- Electronic Commerce Protocols.- Secure Anonymous Signature-Based Transactions.- Metering Schemes for General Access Structures.- Access Control.- A Typed Access Control Model for CORBA.- Safety Analysis of the Dynamic-Typed Access Matrix Model.- A Formal Model for Role-Based Access Control Using Graph Transformation.- Protocol Verification.- A Formal Semantics for SPKI.- Formal Verification of Cardholder Registration in SET.- Automating Data Independence.- Internet Security.- Finding a Connection Chain for Tracing Intruders.- A Full Bandwidth ATM Firewall.- Security Property Analysis.- Analysing Time Dependent Security Properties in CSP Using PVS.- Unwinding Possibilistic Security Properties.- Authentication and Confidentiality via IPsec.- Mobile Agents.- A Security Framework for a Mobile Agent System.- A Distributed Access Control Model for Java.- Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List